A security administrator is hardening a TrustedSolaris server that processes sensitive data. The data owner has established the following se
curity requirements:
The data is for internal consumption only and shall not be distributed to outside individuals
The systems administrator should not have access to the data processed by the server
The integrity of the kernel image is maintained
Which of
the following host-based security controls BEST enforce the data owner-s requirements? (Choose three.)
A. SELinux
B. DLP
C. HIDS
D. Host-based firewall
E. Measured boot
F. Data encryption
G. Watermarking